server/internal/logic/auth/oauth/oAuthLoginGetTokenLogic.go
Leif Draven 41d660bb9e
Develop (#64)
* fix(database): correct name entry for SingBox in initialization script

* fix(purchase): update gift amount deduction logic and handle zero-amount order status

* feat: add type and default fields to rule group requests and update related logic

* feat(rule): implement logic to set a default rule group during creation and update

* fix(rule): add type and default fields to rule group model and update related logic

* feat(proxy): enhance proxy group handling and sorting logic

* refactor(proxy): replace hardcoded group names with constants for better maintainability

* fix(proxy): update group selection logic to skip empty and default names

* feat(proxy): enhance proxy and group handling with new configuration options

* feat(surge): add Surge adapter support and enhance subscription URL handling

* feat(traffic): implement traffic reset logic for subscription cycles

* feat(auth): improve email and mobile config unmarshalling with default values

* fix(auth) upbind email not update

* fix(order) discount set default 1

* fix(order) discount set default 1

* fix: refactor surfboard proxy handling and enhance configuration template

* fix(renewal) discount set default 1

* feat(loon): add Loon configuration template and enhance proxy handling

* feat(subscription): update user subscription status based on expiration time

* fix(renewal): update subscription retrieval method to use token instead of order ID

* feat(order): enhance order processing logic with improved error handling and user subscription management

* fix(order): improve code quality and fix critical bugs in order processing logic

- Fix inconsistent logging calls across all order logic files
- Fix critical gift amount deduction logic bug in renewal process
- Fix variable shadowing errors in database transactions
- Add comprehensive Go-standard documentation comments
- Improve log prefix consistency for better debugging
- Remove redundant discount validation code

* fix(docker): add build argument for version in Docker image build process

* feat(version): add endpoint to retrieve application version information

* fix(auth): improve user authentication method logic and update user cache

* feat(user): add ordering functionality to user list retrieval

* fix(RevenueStatistics) fill list

* fix(UserStatistics) fill list

* fix(user): implement user cache clearing after auth method operations

* fix(auth): enhance OAuth login logic with improved request handling and user registration flow

* fix(user): implement sorting for authentication methods based on priority

* fix(user): correct ordering clause for user retrieval based on filter

* refactor(user): streamline cache management and enhance cache clearing logic

* feat(logs) set logs volume in develop

* fix(handler): implement browser interception to deny access for specific user agents

* fix(resetTraffic) reset daily server

* refactor(trojan): remove unused parameter and clean up logging in slice

* fix(middleware): add domain length check and improve user-agent handling

* fix(middleware): reorder domain processing and enhance user-agent handling

* fix(resetTraffic): update subscription reset logic to use expire_time for monthly and yearly checks

* fix(scheduler): update reset traffic task schedule to run daily at 00:30

* fix(traffic): enhance traffic reset logic for subscriptions and adjust status checks

* fix(activateOrder): update traffic reset logic to include reset day check

* feat(marketing): add batch email task management API and logic

* feat(application): implement CRUD operations for subscribe applications

* feat(types): add user agent limit and list to subscription configuration

* feat(application): update subscription application requests to include structured download links

* feat(application): add scheme field and download link handling to subscribe application

* feat(application): add endpoint to retrieve client information

* feat(application): move DownloadLink and SubscribeApplication types to types.api

* feat(application): add DownloadLink and SubscribeClient types, update client response structure

* feat(application): remove ProxyTemplate field from application API

* feat(application): implement adapter for client configuration and add preview template functionality

* feat(application): move DownloadLink type to types.api and remove from common.api

* feat(application): update PreviewSubscribeTemplate to return structured response

* feat(application): remove ProxyTemplate field from application API

* feat(application): enhance cache key generation for user list and server data

* feat(subscribe): add ClearCache method to manage subscription cache invalidation

* feat(payment): add Description field to PaymentMethodDetail response

* feat(subscribe): update next reset time calculation to use ExpireTime

* feat(purchase): include handling fee in total amount calculation

* feat(subscribe): add V2SubscribeHandler and logic for enhanced subscription management

* feat(subscribe): add output format configuration to subscription adapter

* feat(application): default data

---------

Co-authored-by: Chang lue Tsen <tension@ppanel.dev>
Co-authored-by: NoWay <Bob455668@hotmail.com>
2025-08-15 12:30:21 -04:00

853 lines
27 KiB
Go

package oauth
import (
"context"
"encoding/json"
"fmt"
"time"
"github.com/perfect-panel/server/internal/config"
"github.com/perfect-panel/server/internal/model/auth"
"github.com/perfect-panel/server/internal/model/user"
"github.com/perfect-panel/server/internal/svc"
"github.com/perfect-panel/server/internal/types"
"github.com/perfect-panel/server/pkg/jwt"
"github.com/perfect-panel/server/pkg/logger"
"github.com/perfect-panel/server/pkg/oauth/apple"
"github.com/perfect-panel/server/pkg/oauth/google"
"github.com/perfect-panel/server/pkg/oauth/telegram"
"github.com/perfect-panel/server/pkg/tool"
"github.com/perfect-panel/server/pkg/uuidx"
"github.com/perfect-panel/server/pkg/xerr"
"github.com/pkg/errors"
"gorm.io/gorm"
)
const (
OAuthGoogle = "google"
OAuthApple = "apple"
OAuthTelegram = "telegram"
AuthEmail = "email"
AuthExpire = 86400
TelegramDomain = "ppanel.com"
)
type oauthRequest struct {
Code string `json:"code"`
State string `json:"state"`
}
type OAuthLoginGetTokenLogic struct {
logger.Logger
ctx context.Context
svcCtx *svc.ServiceContext
}
// NewOAuthLoginGetTokenLogic OAuth login get token
func NewOAuthLoginGetTokenLogic(ctx context.Context, svcCtx *svc.ServiceContext) *OAuthLoginGetTokenLogic {
return &OAuthLoginGetTokenLogic{
Logger: logger.WithContext(ctx),
ctx: ctx,
svcCtx: svcCtx,
}
}
func (l *OAuthLoginGetTokenLogic) OAuthLoginGetToken(req *types.OAuthLoginGetTokenRequest, ip, userAgent string) (resp *types.LoginResponse, err error) {
startTime := time.Now()
requestID := uuidx.NewUUID().String()
loginStatus := false
var userInfo *user.User
l.Infow("oauth login request started",
logger.Field("request_id", requestID),
logger.Field("method", req.Method),
logger.Field("ip", ip),
logger.Field("user_agent", userAgent),
)
defer func() {
duration := time.Since(startTime)
l.recordLoginStatus(&loginStatus, &userInfo, ip, userAgent, requestID)
if loginStatus {
l.Infow("oauth login completed successfully",
logger.Field("request_id", requestID),
logger.Field("method", req.Method),
logger.Field("user_id", userInfo.Id),
logger.Field("duration_ms", duration.Milliseconds()),
)
} else {
l.Errorw("oauth login failed",
logger.Field("request_id", requestID),
logger.Field("method", req.Method),
logger.Field("error", err),
logger.Field("duration_ms", duration.Milliseconds()),
)
}
}()
userInfo, err = l.handleOAuthProvider(req, requestID)
if err != nil {
return nil, err
}
token, err := l.generateToken(userInfo, requestID)
if err != nil {
return nil, err
}
loginStatus = true
return &types.LoginResponse{Token: token}, nil
}
func (l *OAuthLoginGetTokenLogic) google(req *types.OAuthLoginGetTokenRequest, requestID string) (*user.User, error) {
startTime := time.Now()
l.Infow("google oauth processing started",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthGoogle),
)
var request oauthRequest
if err := tool.CloneMapToStruct(req.Callback.(map[string]interface{}), &request); err != nil {
l.Errorw("failed to parse google callback data",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthGoogle),
logger.Field("error", err.Error()),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.ERROR), "parse callback data failed: %v", err)
}
l.Debugw("google oauth state validation started",
logger.Field("request_id", requestID),
logger.Field("state", request.State),
)
redirect, err := l.validateStateCode(OAuthGoogle, request.State, requestID)
if err != nil {
return nil, err
}
cfg, err := l.getGoogleConfig(requestID)
if err != nil {
return nil, err
}
client := google.New(&google.Config{
ClientID: cfg.ClientId,
ClientSecret: cfg.ClientSecret,
RedirectURL: redirect,
})
l.Debugw("exchanging google authorization code for token",
logger.Field("request_id", requestID),
logger.Field("redirect_url", redirect),
)
token, err := client.Exchange(l.ctx, request.Code)
if err != nil {
l.Errorw("failed to exchange google authorization code",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthGoogle),
logger.Field("error", err.Error()),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.ERROR), "exchange token failed: %v", err)
}
l.Debugw("fetching google user information",
logger.Field("request_id", requestID),
)
googleUserInfo, err := client.GetUserInfo(token.AccessToken)
if err != nil {
l.Errorw("failed to get google user info",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthGoogle),
logger.Field("error", err.Error()),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.ERROR), "get user info failed: %v", err)
}
l.Infow("google oauth processing completed",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthGoogle),
logger.Field("openid", googleUserInfo.OpenID),
logger.Field("email", googleUserInfo.Email),
logger.Field("duration_ms", time.Since(startTime).Milliseconds()),
)
return l.findOrRegisterUser(OAuthGoogle, googleUserInfo.OpenID, googleUserInfo.Email, googleUserInfo.Picture, requestID)
}
func (l *OAuthLoginGetTokenLogic) apple(req *types.OAuthLoginGetTokenRequest, requestID string) (*user.User, error) {
startTime := time.Now()
l.Infow("apple oauth processing started",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthApple),
)
callback := req.Callback.(map[string]interface{})
state, _ := callback["state"].(string)
code, _ := callback["code"].(string)
l.Debugw("apple oauth state validation started",
logger.Field("request_id", requestID),
logger.Field("state", state),
)
if _, err := l.validateStateCode(OAuthApple, state, requestID); err != nil {
return nil, err
}
cfg, err := l.getAppleConfig(requestID)
if err != nil {
return nil, err
}
client, err := apple.New(apple.Config{
ClientID: cfg.ClientId,
TeamID: cfg.TeamID,
KeyID: cfg.KeyID,
ClientSecret: cfg.ClientSecret,
RedirectURI: cfg.RedirectURL,
})
if err != nil {
l.Errorw("failed to create apple client",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthApple),
logger.Field("error", err.Error()),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.ERROR), "new apple client failed: %v", err)
}
l.Debugw("verifying apple web token",
logger.Field("request_id", requestID),
)
resp, err := client.VerifyWebToken(l.ctx, code)
if err != nil {
l.Errorw("failed to verify apple web token",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthApple),
logger.Field("error", err.Error()),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.ERROR), "verify web token failed: %v", err)
}
if resp.Error != "" {
l.Errorw("apple web token verification returned error",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthApple),
logger.Field("apple_error", resp.Error),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.ERROR), "verify web token failed: %v", resp.Error)
}
appleUnique, err := apple.GetUniqueID(resp.IDToken)
if err != nil {
l.Errorw("failed to get apple unique id",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthApple),
logger.Field("error", err.Error()),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.ERROR), "get apple unique id failed: %v", err)
}
appleUserInfo, err := apple.GetClaims(resp.AccessToken)
if err != nil {
l.Errorw("failed to get apple user claims",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthApple),
logger.Field("error", err.Error()),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.ERROR), "get apple user info failed: %v", err)
}
email := ""
if emailVal, ok := (*appleUserInfo)["email"]; ok {
email, _ = emailVal.(string)
}
l.Infow("apple oauth processing completed",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthApple),
logger.Field("unique_id", appleUnique),
logger.Field("email", email),
logger.Field("duration_ms", time.Since(startTime).Milliseconds()),
)
return l.findOrRegisterUser(OAuthApple, appleUnique, email, "", requestID)
}
func (l *OAuthLoginGetTokenLogic) telegram(req *types.OAuthLoginGetTokenRequest, requestID string) (*user.User, error) {
startTime := time.Now()
l.Infow("telegram oauth processing started",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthTelegram),
)
cfg, err := l.getTelegramConfig(requestID)
if err != nil {
return nil, err
}
encodeText, _ := req.Callback.(map[string]interface{})["tgAuthResult"].(string)
l.Debugw("parsing telegram callback data",
logger.Field("request_id", requestID),
logger.Field("data_length", len(encodeText)),
)
callbackData, err := telegram.ParseAndValidateBase64([]byte(encodeText), cfg.BotToken)
if err != nil {
l.Errorw("failed to parse telegram callback data",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthTelegram),
logger.Field("error", err.Error()),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.ERROR), "parse telegram callback failed: %v", err)
}
l.Debugw("validating telegram auth date",
logger.Field("request_id", requestID),
logger.Field("auth_date", *callbackData.AuthDate),
logger.Field("current_time", time.Now().Unix()),
)
if time.Now().Unix()-*callbackData.AuthDate > AuthExpire {
l.Errorw("telegram auth date expired",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthTelegram),
logger.Field("auth_date", *callbackData.AuthDate),
logger.Field("current_time", time.Now().Unix()),
logger.Field("expire_seconds", AuthExpire),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.ERROR), "auth date expired")
}
userID := fmt.Sprintf("%v", *callbackData.Id)
email := fmt.Sprintf("%v@%s", *callbackData.Id, TelegramDomain)
avatar := ""
if callbackData.PhotoUrl != nil {
avatar = *callbackData.PhotoUrl
}
l.Infow("telegram oauth processing completed",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthTelegram),
logger.Field("user_id", userID),
logger.Field("email", email),
logger.Field("duration_ms", time.Since(startTime).Milliseconds()),
)
return l.findOrRegisterUser(OAuthTelegram, userID, email, avatar, requestID)
}
func (l *OAuthLoginGetTokenLogic) register(email, avatar, method, openid, requestID string) (*user.User, error) {
startTime := time.Now()
l.Infow("user registration started",
logger.Field("request_id", requestID),
logger.Field("auth_method", method),
logger.Field("email", email),
logger.Field("openid", openid),
)
if l.svcCtx.Config.Invite.ForcedInvite {
l.Errorw("registration blocked due to forced invite policy",
logger.Field("request_id", requestID),
logger.Field("auth_method", method),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.InviteCodeError), "invite code is required")
}
var userInfo *user.User
err := l.svcCtx.UserModel.Transaction(l.ctx, func(db *gorm.DB) error {
if email != "" {
l.Debugw("checking if email already exists",
logger.Field("request_id", requestID),
logger.Field("email", email),
)
if err := l.checkEmailExists(db, email, requestID); err != nil {
return err
}
}
l.Debugw("creating new user record",
logger.Field("request_id", requestID),
logger.Field("avatar", avatar),
)
userInfo = &user.User{Avatar: avatar}
if err := db.Create(userInfo).Error; err != nil {
l.Errorw("failed to create user record",
logger.Field("request_id", requestID),
logger.Field("error", err.Error()),
)
return errors.Wrapf(xerr.NewErrCode(xerr.DatabaseInsertError), "create user info failed: %v", err)
}
userInfo.ReferCode = uuidx.UserInviteCode(userInfo.Id)
l.Debugw("updating user refer code",
logger.Field("request_id", requestID),
logger.Field("user_id", userInfo.Id),
logger.Field("refer_code", userInfo.ReferCode),
)
if err := db.Model(&user.User{}).Where("id = ?", userInfo.Id).Update("refer_code", userInfo.ReferCode).Error; err != nil {
l.Errorw("failed to update refer code",
logger.Field("request_id", requestID),
logger.Field("user_id", userInfo.Id),
logger.Field("error", err.Error()),
)
return errors.Wrapf(xerr.NewErrCode(xerr.DatabaseUpdateError), "update refer code failed: %v", err)
}
if err := l.createAuthMethod(db, userInfo.Id, method, openid, requestID); err != nil {
return err
}
if email != "" {
if err := l.createAuthMethod(db, userInfo.Id, AuthEmail, email, requestID); err != nil {
return err
}
}
if l.svcCtx.Config.Register.EnableTrial {
l.Debugw("activating trial subscription",
logger.Field("request_id", requestID),
logger.Field("user_id", userInfo.Id),
)
if err := l.activeTrial(userInfo.Id, requestID); err != nil {
return err
}
}
return nil
})
if err != nil {
l.Errorw("user registration failed",
logger.Field("request_id", requestID),
logger.Field("auth_method", method),
logger.Field("error", err.Error()),
logger.Field("duration_ms", time.Since(startTime).Milliseconds()),
)
return userInfo, err
}
l.Infow("user registration completed successfully",
logger.Field("request_id", requestID),
logger.Field("user_id", userInfo.Id),
logger.Field("auth_method", method),
logger.Field("email", email),
logger.Field("refer_code", userInfo.ReferCode),
logger.Field("duration_ms", time.Since(startTime).Milliseconds()),
)
return userInfo, err
}
func (l *OAuthLoginGetTokenLogic) checkEmailExists(db *gorm.DB, email, requestID string) error {
var methodInfo user.AuthMethods
err := db.Model(&user.AuthMethods{}).Where("auth_identifier = ?", email).First(&methodInfo).Error
if err != nil && !errors.Is(err, gorm.ErrRecordNotFound) {
l.Errorw("failed to check email existence",
logger.Field("request_id", requestID),
logger.Field("email", email),
logger.Field("error", err.Error()),
)
return errors.Wrapf(xerr.NewErrCode(xerr.DatabaseQueryError), "check email exists failed: %v", err)
}
if methodInfo.UserId != 0 {
l.Errorw("email already exists for another user",
logger.Field("request_id", requestID),
logger.Field("email", email),
logger.Field("existing_user_id", methodInfo.UserId),
)
return errors.Wrapf(xerr.NewErrCode(xerr.UserExist), "user email exist: %v", email)
}
l.Debugw("email availability confirmed",
logger.Field("request_id", requestID),
logger.Field("email", email),
)
return nil
}
func (l *OAuthLoginGetTokenLogic) createAuthMethod(db *gorm.DB, userID int64, authType, identifier, requestID string) error {
l.Debugw("creating auth method",
logger.Field("request_id", requestID),
logger.Field("user_id", userID),
logger.Field("auth_type", authType),
logger.Field("identifier", identifier),
)
authMethod := &user.AuthMethods{
UserId: userID,
AuthType: authType,
AuthIdentifier: identifier,
Verified: true,
}
if err := db.Create(authMethod).Error; err != nil {
l.Errorw("failed to create auth method",
logger.Field("request_id", requestID),
logger.Field("user_id", userID),
logger.Field("auth_type", authType),
logger.Field("identifier", identifier),
logger.Field("error", err.Error()),
)
return errors.Wrapf(xerr.NewErrCode(xerr.DatabaseInsertError), "create auth method failed: %v", err)
}
l.Debugw("auth method created successfully",
logger.Field("request_id", requestID),
logger.Field("user_id", userID),
logger.Field("auth_type", authType),
logger.Field("auth_method_id", authMethod.Id),
)
return nil
}
func (l *OAuthLoginGetTokenLogic) recordLoginStatus(loginStatus *bool, userInfo **user.User, ip, userAgent, requestID string) {
if *userInfo != nil && (*userInfo).Id != 0 {
if err := l.svcCtx.UserModel.InsertLoginLog(l.ctx, &user.LoginLog{
UserId: (*userInfo).Id,
LoginIP: ip,
UserAgent: userAgent,
Success: loginStatus,
}); err != nil {
l.Errorw("failed to insert login log",
logger.Field("request_id", requestID),
logger.Field("user_id", (*userInfo).Id),
logger.Field("ip", ip),
logger.Field("error", err.Error()),
)
} else {
l.Debugw("login log recorded successfully",
logger.Field("request_id", requestID),
logger.Field("user_id", (*userInfo).Id),
logger.Field("ip", ip),
logger.Field("success", *loginStatus),
)
}
}
}
func (l *OAuthLoginGetTokenLogic) handleOAuthProvider(req *types.OAuthLoginGetTokenRequest, requestID string) (*user.User, error) {
l.Debugw("handling oauth provider",
logger.Field("request_id", requestID),
logger.Field("provider", req.Method),
)
switch req.Method {
case OAuthGoogle:
return l.google(req, requestID)
case OAuthApple:
return l.apple(req, requestID)
case OAuthTelegram:
return l.telegram(req, requestID)
default:
l.Errorw("unsupported oauth login method",
logger.Field("request_id", requestID),
logger.Field("method", req.Method),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.ERROR), "oauth login method not supported: %v", req.Method)
}
}
func (l *OAuthLoginGetTokenLogic) generateToken(userInfo *user.User, requestID string) (string, error) {
startTime := time.Now()
sessionId := uuidx.NewUUID().String()
l.Debugw("generating jwt token",
logger.Field("request_id", requestID),
logger.Field("user_id", userInfo.Id),
logger.Field("session_id", sessionId),
)
token, err := jwt.NewJwtToken(
l.svcCtx.Config.JwtAuth.AccessSecret,
time.Now().Unix(),
l.svcCtx.Config.JwtAuth.AccessExpire,
jwt.WithOption("UserId", userInfo.Id),
jwt.WithOption("SessionId", sessionId),
)
if err != nil {
l.Errorw("failed to generate jwt token",
logger.Field("request_id", requestID),
logger.Field("user_id", userInfo.Id),
logger.Field("error", err.Error()),
)
return "", errors.Wrapf(xerr.NewErrCode(xerr.ERROR), "token generate error: %v", err)
}
sessionIdCacheKey := fmt.Sprintf("%v:%v", config.SessionIdKey, sessionId)
if err = l.svcCtx.Redis.Set(l.ctx, sessionIdCacheKey, userInfo.Id, time.Duration(l.svcCtx.Config.JwtAuth.AccessExpire)*time.Second).Err(); err != nil {
l.Errorw("failed to cache session id",
logger.Field("request_id", requestID),
logger.Field("user_id", userInfo.Id),
logger.Field("session_id", sessionId),
logger.Field("error", err.Error()),
)
return "", errors.Wrapf(xerr.NewErrCode(xerr.ERROR), "set session id error: %v", err)
}
l.Infow("jwt token generated successfully",
logger.Field("request_id", requestID),
logger.Field("user_id", userInfo.Id),
logger.Field("session_id", sessionId),
logger.Field("duration_ms", time.Since(startTime).Milliseconds()),
)
return token, nil
}
func (l *OAuthLoginGetTokenLogic) validateStateCode(provider, state, requestID string) (string, error) {
stateKey := fmt.Sprintf("%s:%s", provider, state)
l.Debugw("validating oauth state code",
logger.Field("request_id", requestID),
logger.Field("provider", provider),
logger.Field("state_key", stateKey),
)
redirect, err := l.svcCtx.Redis.Get(l.ctx, stateKey).Result()
if err != nil {
l.Errorw("failed to validate state code",
logger.Field("request_id", requestID),
logger.Field("provider", provider),
logger.Field("state_key", stateKey),
logger.Field("error", err.Error()),
)
return "", errors.Wrapf(xerr.NewErrCode(xerr.ERROR), "get %s state code failed: %v", provider, err)
}
l.Debugw("state code validated successfully",
logger.Field("request_id", requestID),
logger.Field("provider", provider),
logger.Field("redirect_url", redirect),
)
return redirect, nil
}
func (l *OAuthLoginGetTokenLogic) getGoogleConfig(requestID string) (*auth.GoogleAuthConfig, error) {
l.Debugw("fetching google oauth config",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthGoogle),
)
authMethod, err := l.svcCtx.AuthModel.FindOneByMethod(l.ctx, OAuthGoogle)
if err != nil {
l.Errorw("failed to find google auth method",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthGoogle),
logger.Field("error", err.Error()),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.DatabaseQueryError), "find google auth method failed: %v", err)
}
var cfg auth.GoogleAuthConfig
if err = cfg.Unmarshal(authMethod.Config); err != nil {
l.Errorw("failed to unmarshal google config",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthGoogle),
logger.Field("config", authMethod.Config),
logger.Field("error", err.Error()),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.ERROR), "unmarshal google config failed: %v", err)
}
l.Debugw("google oauth config loaded successfully",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthGoogle),
logger.Field("client_id", cfg.ClientId),
)
return &cfg, nil
}
func (l *OAuthLoginGetTokenLogic) getAppleConfig(requestID string) (*auth.AppleAuthConfig, error) {
l.Debugw("fetching apple oauth config",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthApple),
)
authMethod, err := l.svcCtx.AuthModel.FindOneByMethod(l.ctx, OAuthApple)
if err != nil {
l.Errorw("failed to find apple auth method",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthApple),
logger.Field("error", err.Error()),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.DatabaseQueryError), "find apple auth method failed: %v", err)
}
var cfg auth.AppleAuthConfig
if err = cfg.Unmarshal(authMethod.Config); err != nil {
l.Errorw("failed to unmarshal apple config",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthApple),
logger.Field("config", authMethod.Config),
logger.Field("error", err.Error()),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.ERROR), "unmarshal apple config failed: %v", err)
}
l.Debugw("apple oauth config loaded successfully",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthApple),
logger.Field("client_id", cfg.ClientId),
logger.Field("team_id", cfg.TeamID),
)
return &cfg, nil
}
func (l *OAuthLoginGetTokenLogic) getTelegramConfig(requestID string) (*auth.TelegramAuthConfig, error) {
l.Debugw("fetching telegram oauth config",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthTelegram),
)
authMethod, err := l.svcCtx.AuthModel.FindOneByMethod(l.ctx, OAuthTelegram)
if err != nil {
l.Errorw("failed to find telegram auth method",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthTelegram),
logger.Field("error", err.Error()),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.DatabaseQueryError), "find telegram auth method failed: %v", err)
}
var cfg auth.TelegramAuthConfig
if err = json.Unmarshal([]byte(authMethod.Config), &cfg); err != nil {
l.Errorw("failed to unmarshal telegram config",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthTelegram),
logger.Field("config", authMethod.Config),
logger.Field("error", err.Error()),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.ERROR), "unmarshal telegram config failed: %v", err)
}
l.Debugw("telegram oauth config loaded successfully",
logger.Field("request_id", requestID),
logger.Field("provider", OAuthTelegram),
)
return &cfg, nil
}
func (l *OAuthLoginGetTokenLogic) findOrRegisterUser(authType, openID, email, avatar, requestID string) (*user.User, error) {
l.Debugw("finding or registering user",
logger.Field("request_id", requestID),
logger.Field("auth_type", authType),
logger.Field("openid", openID),
logger.Field("email", email),
)
userAuthMethod, err := l.svcCtx.UserModel.FindUserAuthMethodByOpenID(l.ctx, authType, openID)
if err != nil {
if errors.Is(err, gorm.ErrRecordNotFound) {
l.Infow("user not found, starting registration",
logger.Field("request_id", requestID),
logger.Field("auth_type", authType),
logger.Field("openid", openID),
logger.Field("email", email),
)
return l.register(email, avatar, authType, openID, requestID)
}
l.Errorw("failed to find user auth method by openid",
logger.Field("request_id", requestID),
logger.Field("auth_type", authType),
logger.Field("openid", openID),
logger.Field("error", err.Error()),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.DatabaseQueryError), "find user auth method by openid failed: %v", err)
}
l.Debugw("found existing user auth method",
logger.Field("request_id", requestID),
logger.Field("auth_type", authType),
logger.Field("user_id", userAuthMethod.UserId),
)
userInfo, err := l.svcCtx.UserModel.FindOne(l.ctx, userAuthMethod.UserId)
if err != nil {
l.Errorw("failed to find user by id",
logger.Field("request_id", requestID),
logger.Field("user_id", userAuthMethod.UserId),
logger.Field("error", err.Error()),
)
return nil, errors.Wrapf(xerr.NewErrCode(xerr.DatabaseQueryError), "find user info failed: %v", err)
}
l.Infow("existing user found successfully",
logger.Field("request_id", requestID),
logger.Field("user_id", userInfo.Id),
logger.Field("auth_type", authType),
)
return userInfo, nil
}
func (l *OAuthLoginGetTokenLogic) activeTrial(uid int64, requestID string) error {
l.Debugw("fetching trial subscription template",
logger.Field("request_id", requestID),
logger.Field("user_id", uid),
logger.Field("trial_subscribe_id", l.svcCtx.Config.Register.TrialSubscribe),
)
sub, err := l.svcCtx.SubscribeModel.FindOne(l.ctx, l.svcCtx.Config.Register.TrialSubscribe)
if err != nil {
l.Errorw("failed to find trial subscription template",
logger.Field("request_id", requestID),
logger.Field("user_id", uid),
logger.Field("trial_subscribe_id", l.svcCtx.Config.Register.TrialSubscribe),
logger.Field("error", err.Error()),
)
return err
}
startTime := time.Now()
expireTime := tool.AddTime(l.svcCtx.Config.Register.TrialTimeUnit, l.svcCtx.Config.Register.TrialTime, startTime)
subscribeToken := uuidx.SubscribeToken(fmt.Sprintf("Trial-%v", uid))
subscribeUUID := uuidx.NewUUID().String()
l.Debugw("creating trial subscription",
logger.Field("request_id", requestID),
logger.Field("user_id", uid),
logger.Field("subscribe_id", sub.Id),
logger.Field("start_time", startTime),
logger.Field("expire_time", expireTime),
logger.Field("traffic", sub.Traffic),
logger.Field("token", subscribeToken),
logger.Field("uuid", subscribeUUID),
)
userSub := &user.Subscribe{
Id: 0,
UserId: uid,
OrderId: 0,
SubscribeId: sub.Id,
StartTime: startTime,
ExpireTime: expireTime,
Traffic: sub.Traffic,
Download: 0,
Upload: 0,
Token: subscribeToken,
UUID: subscribeUUID,
Status: 1,
}
if err := l.svcCtx.UserModel.InsertSubscribe(l.ctx, userSub); err != nil {
l.Errorw("failed to insert trial subscription",
logger.Field("request_id", requestID),
logger.Field("user_id", uid),
logger.Field("error", err.Error()),
)
return err
}
l.Infow("trial subscription activated successfully",
logger.Field("request_id", requestID),
logger.Field("user_id", uid),
logger.Field("subscribe_id", sub.Id),
logger.Field("expire_time", expireTime),
logger.Field("traffic", sub.Traffic),
)
return nil
}